Take a look at the following phishing website: Just another phishing website? Think again.. Take a look at the page source
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 |
body { background-image: url(bg02.jpg); background-repeat: no-repeat; } <table class="pageformgrid bottomspacer2" cellpadding="0" width="559"> <tbody> <tr> <td width="553" height="169"> <form action="a.php" method="post"> <table id="form1:panelGrid2" class="subgrid1 registeruserform" cellpadding="0" width="322"> <tbody> <tr> <td class="aaaass" width="133"></td> <td width="181"></td> </tr> <tr> <td class="aaaass"></td> <td></td> </tr> </tbody> </table> </form></td> </tr> </tbody> </table> <table id="pula" class="subgrid3" cellpadding="0"> <tbody> <tr> <td></td> </tr> </tbody> </table> |
The phisher is using image instead of HTML. And YES, this technique can bypass DontPhishMe. I’ve worked on new method to solve this problem and now, DontPhishMe v0.3.1 are able to detect this […]